首页 > 最新文献

Applicable Algebra in Engineering Communication and Computing最新文献

英文 中文
Algebraic and SAT models for SCA generation SCA生成的代数和SAT模型
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-02-21 DOI: 10.1007/s00200-023-00597-4
Marlene Koelbing, Bernhard Garn, Enrico Iurlano, Ilias S. Kotsireas, Dimitris E. Simos

In this paper, we compute sequence covering arrays (SCAs), which are arrays, consisting of sequences, such that all subsequences with pairwise different entries of some length are covered, via a novel approach based on commutative algebra and symbolic computation. Hereby, we provide various algebraic models being capable to characterize possibly small sets of permutations collectively containing particular shorter subsequences. These models take the form of multivariate polynomial systems of equations and are then processed via supercomputing by a Gröbner Basis solver in order to compute solutions from them. If the variety is not empty, i.e. the Gröbner basis is non-trivial, then each point in the computed variety can be transformed to a SCA. In our experiments, we observed varying computational performance depending on the chosen model, while all of them exhibited scalability issues. Additionally and for comparison, we give new SAT descriptions modelling SCAs. By employing a SAT solver on our provided SAT models, we are able to provide upper bounds, one of which is best among literature results. Lastly, we adapt our SAT approach to answer a question posed by Yuster (Des Codes Cryptogr 88(3):585–593, 2020). As a result, we find a characterization of the dimensions of all perfect SCAs with coverage multiplicity two of strength three.

{"title":"Algebraic and SAT models for SCA generation","authors":"Marlene Koelbing,&nbsp;Bernhard Garn,&nbsp;Enrico Iurlano,&nbsp;Ilias S. Kotsireas,&nbsp;Dimitris E. Simos","doi":"10.1007/s00200-023-00597-4","DOIUrl":"10.1007/s00200-023-00597-4","url":null,"abstract":"<div><p>In this paper, we compute sequence covering arrays (SCAs), which are arrays, consisting of sequences, such that all subsequences with pairwise different entries of some length are covered, via a novel approach based on commutative algebra and symbolic computation. Hereby, we provide various algebraic models being capable to characterize possibly small sets of permutations collectively containing particular shorter subsequences. These models take the form of multivariate polynomial systems of equations and are then processed via supercomputing by a Gröbner Basis solver in order to compute solutions from them. If the variety is not empty, i.e. the Gröbner basis is non-trivial, then each point in the computed variety can be transformed to a SCA. In our experiments, we observed varying computational performance depending on the chosen model, while all of them exhibited scalability issues. Additionally and for comparison, we give new SAT descriptions modelling SCAs. By employing a SAT solver on our provided SAT models, we are able to provide upper bounds, one of which is best among literature results. Lastly, we adapt our SAT approach to answer a question posed by Yuster (Des Codes Cryptogr 88(3):585–593, 2020). As a result, we find a characterization of the dimensions of all perfect SCAs with coverage multiplicity two of strength three.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"36 2","pages":"173 - 222"},"PeriodicalIF":0.6,"publicationDate":"2023-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00200-023-00597-4.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48363389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
x-superoptimal pairings on elliptic curves with odd prime embedding degrees: BW13-P310 and BW19-P286 奇素数嵌入度椭圆曲线BW13-P310和BW19-P286上的x超优配对
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-02-16 DOI: 10.1007/s00200-023-00596-5
Emmanuel Fouotsa, Laurian Azebaze Guimagang, Raoul Ayissi

The choice of the elliptic curve for a given pairing based protocol is primordial. For many cryptosystems based on pairings such as group signatures and their variants (EPID, anonymous attestation, etc) or accumulators, operations in the first pairing group (mathbb {G}) of points of the elliptic curve is more predominant. At 128-bit security level two curves BW13-P310 and BW19-P286 with odd embedding degrees 13 and 19 suitable for super optimal pairing have been recommended for such pairing based protocols. But a prime embedding degree ((k=13;19)) eliminates some important optimisation for the pairing computation. However The Miller loop length of the superoptimal pairing is the half of that of the optimal ate pairing but involve more exponentiations that affect its efficiency. In this work, we successfully develop methods and construct algorithms to efficiently evaluate and avoid heavy exponentiations that affect the efficiency of the superoptimal pairing. This leads to the definition of new bilinear and non degenerate pairing on BW13-P310 and BW19-P286 called x-superoptimal pairing where its Miller loop is about (15.3 %) and (39.8 %) faster than the one of the optimal ate pairing previously computed on BW13-P310 and BW19-P286 respectively.

{"title":"x-superoptimal pairings on elliptic curves with odd prime embedding degrees: BW13-P310 and BW19-P286","authors":"Emmanuel Fouotsa,&nbsp;Laurian Azebaze Guimagang,&nbsp;Raoul Ayissi","doi":"10.1007/s00200-023-00596-5","DOIUrl":"10.1007/s00200-023-00596-5","url":null,"abstract":"<div><p>The choice of the elliptic curve for a given pairing based protocol is primordial. For many cryptosystems based on pairings such as group signatures and their variants (EPID, anonymous attestation, etc) or accumulators, operations in the first pairing group <span>(mathbb {G})</span> of points of the elliptic curve is more predominant. At 128-bit security level two curves <i>BW</i>13-<i>P</i>310 and <i>BW</i>19-<i>P</i>286 with odd embedding degrees 13 and 19 suitable for super optimal pairing have been recommended for such pairing based protocols. But a prime embedding degree (<span>(k=13;19)</span>) eliminates some important optimisation for the pairing computation. However The Miller loop length of the superoptimal pairing is the half of that of the optimal ate pairing but involve more exponentiations that affect its efficiency. In this work, we successfully develop methods and construct algorithms to efficiently evaluate and avoid heavy exponentiations that affect the efficiency of the superoptimal pairing. This leads to the definition of new bilinear and non degenerate pairing on <i>BW</i>13-<i>P</i>310 and <i>BW</i>19-<i>P</i>286 called <i>x</i>-superoptimal pairing where its Miller loop is about <span>(15.3 %)</span> and <span>(39.8 %)</span> faster than the one of the optimal ate pairing previously computed on <i>BW</i>13-<i>P</i>310 and <i>BW</i>19-<i>P</i>286 respectively.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"36 2","pages":"153 - 171"},"PeriodicalIF":0.6,"publicationDate":"2023-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00200-023-00596-5.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48519380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the 2-adic complexity of cyclotomic binary sequences of order four 关于四阶分圆二进制序列的2-dic复杂性
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-02-13 DOI: 10.1007/s00200-023-00598-3
Fuqing Sun, Qin Yue, Xia Li

Let (pequiv 1pmod 4) be a prime. In this paper, we support a new method, i.e., a product of 2-adic values for four binary sequences, to determine the maximum evaluations of the 2-adic complexity in all almost balanced cyclotomic binary sequences of order four with period (N=p), which are viewed as generalizing the results in Hu (IEEE Trans. Inf. Theory 60:5803–5804, 2014) and Xiong et al. (IEEE Trans. Inf. Theory 60:2399–2406, 2014) without the autocorrelation values of cyclotomic binary sequences of order four with period p. By number theory we obtain two necessary and sufficient conditions about the 2-adic complexity of all balanced cyclotomic binary sequences of order four with period (N=2p) and show the 2-adic complexity of several non-balanced cyclotomic binary sequences of order four with period 2p, which are viewed as generalizing the results in Zhang et al. (IEEE Trans. Inf. Theory 66:4613–4620, 2020).

{"title":"On the 2-adic complexity of cyclotomic binary sequences of order four","authors":"Fuqing Sun,&nbsp;Qin Yue,&nbsp;Xia Li","doi":"10.1007/s00200-023-00598-3","DOIUrl":"10.1007/s00200-023-00598-3","url":null,"abstract":"<div><p>Let <span>(pequiv 1pmod 4)</span> be a prime. In this paper, we support a new method, i.e., a product of 2-adic values for four binary sequences, to determine the maximum evaluations of the 2-adic complexity in all almost balanced cyclotomic binary sequences of order four with period <span>(N=p)</span>, which are viewed as generalizing the results in Hu (IEEE Trans. Inf. Theory 60:5803–5804, 2014) and Xiong et al. (IEEE Trans. Inf. Theory 60:2399–2406, 2014) without the autocorrelation values of cyclotomic binary sequences of order four with period <i>p</i>. By number theory we obtain two necessary and sufficient conditions about the 2-adic complexity of all balanced cyclotomic binary sequences of order four with period <span>(N=2p)</span> and show the 2-adic complexity of several non-balanced cyclotomic binary sequences of order four with period 2<i>p</i>, which are viewed as generalizing the results in Zhang et al. (IEEE Trans. Inf. Theory 66:4613–4620, 2020).</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"36 2","pages":"133 - 151"},"PeriodicalIF":0.6,"publicationDate":"2023-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00200-023-00598-3.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49026945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two dimensional double cyclic codes over finite fields 有限域上的二维双循环码
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-02-01 DOI: 10.1007/s00200-023-00595-6
Niloufar Hajiaghajanpour, Kazem Khashyarmanesh

A linear code C of length (n = ru + sv) is a two-dimensional ({mathbb {F}})-double cyclic code if the set of coordinates can be partitioned into two arrays, such that any cyclic row-shifts and column-shifts of both arrays of a codeword is also a codeword. In this paper, we examine the algebraic structure of these codes and their dual codes in general. Moreover, we are interested in finding out a generating set for these codes (and their dual codes) in case when (u=2), (v=4) and char((F) ne 2).

{"title":"Two dimensional double cyclic codes over finite fields","authors":"Niloufar Hajiaghajanpour,&nbsp;Kazem Khashyarmanesh","doi":"10.1007/s00200-023-00595-6","DOIUrl":"10.1007/s00200-023-00595-6","url":null,"abstract":"<div><p>A linear code <i>C</i> of length <span>(n = ru + sv)</span> is a two-dimensional <span>({mathbb {F}})</span>-double cyclic code if the set of coordinates can be partitioned into two arrays, such that any cyclic row-shifts and column-shifts of both arrays of a codeword is also a codeword. In this paper, we examine the algebraic structure of these codes and their dual codes in general. Moreover, we are interested in finding out a generating set for these codes (and their dual codes) in case when <span>(u=2)</span>, <span>(v=4)</span> and char<span>((F) ne 2)</span>.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"36 2","pages":"107 - 131"},"PeriodicalIF":0.6,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00200-023-00595-6.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49092840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Algorithmic counting of nonequivalent compact Huffman codes 非等价紧凑霍夫曼码的算法计数
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-01-12 DOI: 10.1007/s00200-022-00593-0
Christian Elsholtz, Clemens Heuberger, Daniel Krenn

It is known that the following five counting problems lead to the same integer sequence ({f_t}({n})):

  1. (1)

    the number of nonequivalent compact Huffman codes of length n over an alphabet of t letters,

  2. (2)

    the number of “nonequivalent” complete rooted t-ary trees (level-greedy trees) with n leaves,

  3. (3)

    the number of “proper” words (in the sense of Even and Lempel),

  4. (4)

    the number of bounded degree sequences (in the sense of Komlós, Moser, and Nemetz), and

  5. (5)

    the number of ways of writing

    $$begin{aligned} 1= frac{1}{t^{x_1}}+ dots + frac{1}{t^{x_n}} end{aligned}$$

    with integers (0 le x_1 le x_2 le dots le x_n).

In this work, we show that one can compute this sequence for all (n<N) with essentially one power series division. In total we need at most (N^{1+varepsilon }) additions and multiplications of integers of cN bits (for a positive constant (c<1) depending on t only) or (N^{2+varepsilon }) bit operations, respectively, for any (varepsilon >0). This improves an earlier bound by Even and Lempel who needed ({O}({{N^3}})) operations in the integer ring or (O({N^4})) bit operations, respectively.

众所周知,以下五个计数问题会导致相同的整数序列 ({f_t}({n})): (1) 长度为 n、长度为 t、长度为 t 个字母的非等价紧凑哈夫曼码的个数;(2) 有 n 个叶子的 "非等价 "完整有根 tary 树(level-greedy 树)的个数;(3) "适当 "词的个数(在 Even 和 Lempel 的意义上)、 (4) 有界程度序列的个数(在 Komlós、Moser 和 Nemetz 的意义上),以及 (5) $$begin{aligned} 1= frac{1}{t^{x_1}}+ dots + frac{1}{t^{x_n}} 的写法个数。end{aligned}$$ 与整数 (0 le x_1 le x_2 le dots le x_n). 在这项工作中,我们证明了对于所有的 (n<N) 都可以用一个幂级数除法来计算这个序列。对于任意的(varepsilon >0),我们总共只需要对cN比特的整数进行加法和乘法运算(对于一个正常数(c<1)只取决于t),或者分别进行(N^{2+varepsilon }) 比特运算。这改进了埃文(Even)和伦佩尔(Lempel)的早期约束,他们分别需要在整数环中进行({O}({{N^3}})) 操作或(O({N^4})) 位操作。
{"title":"Algorithmic counting of nonequivalent compact Huffman codes","authors":"Christian Elsholtz,&nbsp;Clemens Heuberger,&nbsp;Daniel Krenn","doi":"10.1007/s00200-022-00593-0","DOIUrl":"10.1007/s00200-022-00593-0","url":null,"abstract":"<div><p>It is known that the following five counting problems lead to the same integer sequence <span>({f_t}({n}))</span>: </p><ol>\u0000 <li>\u0000 <span>(1)</span>\u0000 \u0000 <p>the number of nonequivalent compact Huffman codes of length <i>n</i> over an alphabet of <i>t</i> letters,</p>\u0000 \u0000 </li>\u0000 <li>\u0000 <span>(2)</span>\u0000 \u0000 <p>the number of “nonequivalent” complete rooted <i>t</i>-ary trees (level-greedy trees) with <i>n</i> leaves,</p>\u0000 \u0000 </li>\u0000 <li>\u0000 <span>(3)</span>\u0000 \u0000 <p>the number of “proper” words (in the sense of Even and Lempel),</p>\u0000 \u0000 </li>\u0000 <li>\u0000 <span>(4)</span>\u0000 \u0000 <p>the number of bounded degree sequences (in the sense of Komlós, Moser, and Nemetz), and</p>\u0000 \u0000 </li>\u0000 <li>\u0000 <span>(5)</span>\u0000 \u0000 <p>the number of ways of writing </p><div><div><span>$$begin{aligned} 1= frac{1}{t^{x_1}}+ dots + frac{1}{t^{x_n}} end{aligned}$$</span></div></div><p> with integers <span>(0 le x_1 le x_2 le dots le x_n)</span>.</p>\u0000 \u0000 </li>\u0000 </ol><p>In this work, we show that one can compute this sequence for <b>all</b> <span>(n&lt;N)</span> with essentially one power series division. In total we need at most <span>(N^{1+varepsilon })</span> additions and multiplications of integers of <i>cN</i> bits (for a positive constant <span>(c&lt;1)</span> depending on <i>t</i> only) or <span>(N^{2+varepsilon })</span> bit operations, respectively, for any <span>(varepsilon &gt;0)</span>. This improves an earlier bound by Even and Lempel who needed <span>({O}({{N^3}}))</span> operations in the integer ring or <span>(O({N^4}))</span> bit operations, respectively.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"35 6","pages":"887 - 903"},"PeriodicalIF":0.6,"publicationDate":"2023-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00200-022-00593-0.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47254023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The automorphism group of projective norm graphs 投影范数图的自同构群
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-01-10 DOI: 10.1007/s00200-022-00590-3
Tomas Bayer, Tamás Mészáros, Lajos Rónyai, Tibor Szabó

The projective norm graphs are central objects to extremal combinatorics. They appear in a variety of contexts, most importantly they provide tight constructions for the Turán number of complete bipartite graphs (K_{t,s}) with (s>(t-1)!). In this note we deepen their understanding further by determining their automorphism group.

投影规范图是极值组合学的核心对象。它们出现在各种场合,最重要的是,它们为具有 (s>(t-1)!)的完整双方形图 (K_{t,s})的图兰数提供了严密的构造。在本注释中,我们通过确定它们的自变群进一步加深了对它们的理解。
{"title":"The automorphism group of projective norm graphs","authors":"Tomas Bayer,&nbsp;Tamás Mészáros,&nbsp;Lajos Rónyai,&nbsp;Tibor Szabó","doi":"10.1007/s00200-022-00590-3","DOIUrl":"10.1007/s00200-022-00590-3","url":null,"abstract":"<div><p>The projective norm graphs are central objects to extremal combinatorics. They appear in a variety of contexts, most importantly they provide tight constructions for the Turán number of complete bipartite graphs <span>(K_{t,s})</span> with <span>(s&gt;(t-1)!)</span>. In this note we deepen their understanding further by determining their automorphism group.\u0000</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"35 6","pages":"875 - 886"},"PeriodicalIF":0.6,"publicationDate":"2023-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00200-022-00590-3.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45591908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bounds on the maximum nonlinearity of permutations on the rings ({mathbb {Z}}_p) and ({mathbb {Z}}_{2p}) 环$${mathbb{Z}}_p$$Zp上置换的最大非线性的界$
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-01-04 DOI: 10.1007/s00200-022-00594-z
Prachi Gupta, P. R. Mishra, Atul Gaur

In 2016, Y. Kumar et al. in the paper ‘Affine equivalence and non-linearity of permutations over ({mathbb {Z}}_n)’ conjectured that: For (nge 3), the nonlinearity of any permutation on ({mathbb {Z}}_n), the ring of integers modulo n, cannot exceed (n-2). For an odd prime p, we settle the above conjecture when (n=2p) and for (pequiv 3 pmod {4}) we prove the above conjecture with an improved upper bound. Further, we derive a lower bound on (max {mathcal {N}}{mathcal {L}}_n) when n is an odd prime or twice of an odd prime where (max {mathcal {N}}{mathcal {L}}_n) denotes the maximum possible nonlinearity of any permutation on ({mathbb {Z}}_n).

2016 年,Y. Kumar 等人在《Affine equivalence and non-linearity of permutations over ({mathbb{Z}}_n)》一文中提出了如下猜想:对于 (nge 3), 在 n 的整数环 ({mathbb {Z}}_n) 上的任何排列的非线性都不能超过 (n-2)。对于奇素数 p,当 (n=2p) 时,我们解决了上述猜想;对于 (pequiv 3 pmod {4}) ,我们用改进的上界证明了上述猜想。此外,当 n 是奇素数或奇素数的两倍时,我们得出了 (max {mathcal {N}}{mathcal {L}}_n) 的下界,其中 (max {mathcal {N}}{mathcal {L}}_n)表示 ({mathbb {Z}}_n) 上任意置换的最大可能非线性。
{"title":"Bounds on the maximum nonlinearity of permutations on the rings ({mathbb {Z}}_p) and ({mathbb {Z}}_{2p})","authors":"Prachi Gupta,&nbsp;P. R. Mishra,&nbsp;Atul Gaur","doi":"10.1007/s00200-022-00594-z","DOIUrl":"10.1007/s00200-022-00594-z","url":null,"abstract":"<div><p>In 2016, Y. Kumar et al. in the paper ‘<i>Affine equivalence and non-linearity of permutations over</i> <span>({mathbb {Z}}_n)</span>’ conjectured that: <i>For</i> <span>(nge 3)</span>, <i>the nonlinearity of any permutation on</i> <span>({mathbb {Z}}_n)</span>, <i>the ring of integers modulo</i> <i>n</i>, <i>cannot exceed</i> <span>(n-2)</span>. For an odd prime <i>p</i>, we settle the above conjecture when <span>(n=2p)</span> and for <span>(pequiv 3 pmod {4})</span> we prove the above conjecture with an improved upper bound. Further, we derive a lower bound on <span>(max {mathcal {N}}{mathcal {L}}_n)</span> when <i>n</i> is an odd prime or twice of an odd prime where <span>(max {mathcal {N}}{mathcal {L}}_n)</span> denotes the maximum possible nonlinearity of any permutation on <span>({mathbb {Z}}_n)</span>.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"35 6","pages":"859 - 874"},"PeriodicalIF":0.6,"publicationDate":"2023-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49231409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Self-orthogonal codes constructed from weakly self-orthogonal designs invariant under an action of $$M_{11}$$ M 11 在$$M_{11}$$ m11的作用下,由弱自正交设计不变量构造自正交码
IF 0.7 4区 工程技术 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-01-01 DOI: 10.1007/s00200-020-00484-2
Vedrana Mikulić Crnković, Ivona Traunkar
{"title":"Self-orthogonal codes constructed from weakly self-orthogonal designs invariant under an action of \u0000 \u0000 \u0000 \u0000 $$M_{11}$$\u0000 \u0000 \u0000 M\u0000 11\u0000 \u0000 \u0000","authors":"Vedrana Mikulić Crnković, Ivona Traunkar","doi":"10.1007/s00200-020-00484-2","DOIUrl":"https://doi.org/10.1007/s00200-020-00484-2","url":null,"abstract":"","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"34 1","pages":"139-156"},"PeriodicalIF":0.7,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s00200-020-00484-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52020721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Quaternary Hermitian self-dual codes of lengths 26, 32, 36, 38 and 40 from modifications of well-known circulant constructions 长度为 26、32、36、38 和 40 的四元赫米特自偶码,源自对著名环形结构的修改
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2022-12-22 DOI: 10.1007/s00200-022-00589-w
Adam Michael Roberts

In this work, we give three new techniques for constructing Hermitian self-dual codes over commutative Frobenius rings with a non-trivial involutory automorphism using (lambda)-circulant matrices. The new constructions are derived as modifications of various well-known circulant constructions of self-dual codes. Applying these constructions together with the building-up construction, we construct many new best known quaternary Hermitian self-dual codes of lengths 26, 32, 36, 38 and 40.

在这项工作中,我们给出了利用 (lambda)-circulant 矩阵在具有非难卷入自定形态的交换弗罗贝尼乌斯环上构造赫米蒂自偶码的三种新技术。新的构造是对各种著名的自偶码循环构造的修改。应用这些构造和堆积构造,我们构造了长度为 26、32、36、38 和 40 的许多新的最著名的四元赫米特自偶码。
{"title":"Quaternary Hermitian self-dual codes of lengths 26, 32, 36, 38 and 40 from modifications of well-known circulant constructions","authors":"Adam Michael Roberts","doi":"10.1007/s00200-022-00589-w","DOIUrl":"10.1007/s00200-022-00589-w","url":null,"abstract":"<div><p>In this work, we give three new techniques for constructing Hermitian self-dual codes over commutative Frobenius rings with a non-trivial involutory automorphism using <span>(lambda)</span>-circulant matrices. The new constructions are derived as modifications of various well-known circulant constructions of self-dual codes. Applying these constructions together with the building-up construction, we construct many new best known quaternary Hermitian self-dual codes of lengths 26, 32, 36, 38 and 40.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"35 6","pages":"833 - 858"},"PeriodicalIF":0.6,"publicationDate":"2022-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76378620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On a special type of permutation rational functions 一类特殊的置换有理函数
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2022-12-16 DOI: 10.1007/s00200-022-00592-1
Nurdagül Anbar

Let p be a prime and n be a positive integer. We consider rational functions (f_b(X)=X+1/(X^p-X+b)) over ({mathbb {F}}_{p^n}) with (textrm{Tr}(b)ne 0). In Hou and Sze (Finite Fields Appl 68, Paper No. 10175, 2020), it is shown that (f_b(X)) is not a permutation for (p>3) and (nge 5), while it is for (p=2,3) and (nge 1). It is conjectured that (f_b(X)) is also not a permutation for (p>3) and (n=3,4), which was recently proved sufficiently large primes in Bartoli and Hou (Finite Fields Appl 76, Paper No. 101904, 2021). In this note, we give a new proof for the fact that (f_b(X)) is not a permutation for (p>3) and (nge 5). With this proof, we also show the existence of many elements (bin {mathbb {F}}_{p^n}) for which (f_b(X)) is not a permutation for (n=3,4).

让 p 是素数,n 是正整数。我们考虑有理函数 (f_b(X)=X+1/(X^p-X+b)) over ({mathbb {F}}_{p^n}) with (textrm{Tr}(b)ne 0).在 Hou 和 Sze 的论文(Finite Fields Appl 68, Paper No. 10175, 2020)中,证明了对于 (p>3) 和 (nge 5) 来说,(f_b(X))不是一个置换,而对于 (p=2,3) 和 (nge 1) 来说,它是一个置换。有人猜想,对于(p>3) 和(n=3,4),(f_b(X)) 也不是一个置换,这一点最近在 Bartoli 和 Hou(Finite Fields Appl 76,论文编号 101904,2021)中得到了充分的证明。在这篇笔记中,我们给出了一个新的证明,即对于(p>3)和(nge 5) 来说,(f_b(X))不是一个置换。通过这个证明,我们还证明了存在许多元素 (bin {mathbb {F}}_{p^n}) 对于 (n=3,4) 来说,(f_b(X))不是一个排列组合。
{"title":"On a special type of permutation rational functions","authors":"Nurdagül Anbar","doi":"10.1007/s00200-022-00592-1","DOIUrl":"10.1007/s00200-022-00592-1","url":null,"abstract":"<div><p>Let <i>p</i> be a prime and <i>n</i> be a positive integer. We consider rational functions <span>(f_b(X)=X+1/(X^p-X+b))</span> over <span>({mathbb {F}}_{p^n})</span> with <span>(textrm{Tr}(b)ne 0)</span>. In Hou and Sze (Finite Fields Appl 68, Paper No. 10175, 2020), it is shown that <span>(f_b(X))</span> is not a permutation for <span>(p&gt;3)</span> and <span>(nge 5)</span>, while it is for <span>(p=2,3)</span> and <span>(nge 1)</span>. It is conjectured that <span>(f_b(X))</span> is also not a permutation for <span>(p&gt;3)</span> and <span>(n=3,4)</span>, which was recently proved sufficiently large primes in Bartoli and Hou (Finite Fields Appl 76, Paper No. 101904, 2021). In this note, we give a new proof for the fact that <span>(f_b(X))</span> is not a permutation for <span>(p&gt;3)</span> and <span>(nge 5)</span>. With this proof, we also show the existence of many elements <span>(bin {mathbb {F}}_{p^n})</span> for which <span>(f_b(X))</span> is not a permutation for <span>(n=3,4)</span>.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"35 6","pages":"821 - 832"},"PeriodicalIF":0.6,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41795141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Applicable Algebra in Engineering Communication and Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1